Penetration audit consists in a practical analysis of ICT system security in the form of:
- network interfaces,
- network nodes,
- servers,
- end devices,
- printing and scanning devices.
The audit includes:
- Local network and Internet penetration testing
- Wireless network security tests
- Scanning systems for security holes
- Research on the security of web systems (websites and services)
- Testing users’ resistance to social engineering
Purpose of the audit
The purpose of the audit is a practical assessment of the current security status of the system, in particular the vulnerability and resistance to attempts to breach security.
Methodology
Penetration audit involves the analysis of the system and its security in terms of:
- potential security bugs due to improper configuration,
- software vulnerabilities,
- hardware vulnerabilities,
- technical weaknesses,
- procedural weaknesses,
- awareness level of users.
The audit is carried out from the perspective of the potential aggressor.
Your benefits!
You receive information about:
- the state of your ICT system,
- security you need to implement
- the gaps you need to close.
You will be safe with us!
New!
Easy ISO & AQAP Management
Any questions?
Contact us!